Next Article in Journal
The Impact of Code Smells on Software Bugs: A Systematic Literature Review
Previous Article in Journal
Remotely Monitoring Cancer-Related Fatigue Using the Smart-Phone: Results of an Observational Study
Article Menu

Export Article

Open AccessArticle
Information 2018, 9(11), 272; https://doi.org/10.3390/info9110272

Efficient Public Key Encryption with Disjunctive Keywords Search Using the New Keywords Conversion Method

1,* , 1
and
2
1
School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China
2
Department of Computer Science, Wayne State University, Detroit 48202, USA
*
Author to whom correspondence should be addressed.
Received: 8 October 2018 / Revised: 28 October 2018 / Accepted: 29 October 2018 / Published: 1 November 2018
(This article belongs to the Section Information Theory and Methodology)
Full-Text   |   PDF [1578 KB, uploaded 1 November 2018]   |  

Abstract

Public key encryption with disjunctive keyword search (PEDK) is a public key encryption scheme that allows disjunctive keyword search over encrypted data without decryption. This kind of scheme is crucial to cloud storage and has received a lot of attention in recent years. However, the efficiency of the previous scheme is limited due to the selection of a less efficient converting method which is used to change query and index keywords into a vector space model. To address this issue, we design a novel converting approach with better performance, and give two adaptively secure PEDK schemes based on this method. The first one is built on an efficient inner product encryption scheme with less searching time, and the second one is constructed over composite order bilinear groups with higher efficiency on index and trapdoor construction. The theoretical analysis and experiment results verify that our schemes are more efficient in time and space complexity as well as more suitable for the mobile cloud setting compared with the state-of-art schemes. View Full-Text
Keywords: searchable encryption scheme; public key system; disjunctive keyword search; mobile security; data privacy searchable encryption scheme; public key system; disjunctive keyword search; mobile security; data privacy
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Zhang, Y.; Li, Y.; Wang, Y. Efficient Public Key Encryption with Disjunctive Keywords Search Using the New Keywords Conversion Method. Information 2018, 9, 272.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Information EISSN 2078-2489 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top